Endpoint Security

360 degree all-round protection for your endpoints

70% of all malware attacks originate at the endpoints and almost as many enter the network. Matrix42 Endpoint Security provides companies with 360° security management for the prevention and protection of devices, systems and data. The special feature: The solution automates the entire process from prevention and detection to countermeasures in the event of damage, without loss of productivity.

Only a managed IT workplace is a secure IT workplace. By acquiring EgoSecure, one of the leading German software provider for Endpoint Security, Matrix42 extends its solution portfolio with data encryption, interface and application control as well as security monitoring. Companies benefit from 360° security management providing a higher degree of automation to protect their data and endpoints.

Endpoint Security Compliance

Full control over the devices and applications used

Endpoint Security Protection

Full control over your data through encryption

Endpoint Security Prevention

Preventive security for data through analyses and regulations

Automated Endpoint Detection & Response

Automatically secure end devices and defend against attacks

KWM WEISSHAAR runs security from a central management console

“The combination of Matrix42 Workspace Management, and the integration of EgoSecure and Avira within a centralized management environment, creates a solution that is significantly more effective than any other I have seen.” Peter Henning, IT-Administrator, KWM WEISSHAAR

Difference between endpoint security, antivirus and firewalls

Software for endpoint security is an important protection factor against ransomware and other attacks today. The software provides an additional layer of protection against malware that goes far beyond what antivirus solutions and firewalls can provide. The solution also helps you to implement and comply with security guidelines.

Endpoint Security Compliance

Full control over the devices and applications used

Device Control

The software determines the use and scope of use of devices (e.g. USB sticks, CDs, TV tuners) or interfaces (e.g. WLAN, Firewire, USB).

This prevents the loss of data and the intrusion of malware into the network via the interfaces.

Application Control

The software controls which user calls which programs. This blocks the start of unlicensed or unauthorized software. This reduces possible liability risks and the risk of economic damage, e.g. through subsequent licensing.

Secure Audit

The software makes data flows visible and shows possible weaknesses in the protection settings. In addition, forensic information can be determined. This protocol is prescribed by the Federal Data Protection Act. A four- or six-eye principle protects the rights of employees.

Endpoint Security Protection

Full control over your data through encryption

Loss or theft of end devices is part of everyday life. Sensitive data falls into the wrong hands in this way. Encrypting the data ensures that authorized users have access to the device and the data. Smart Cards and eToken increase the security of encryption. Our software is FIPS 140-2 Level 1 certified and supports the Advanced Encryption Standard New Instructions (AES-NI).

Endpoint Security Prevention

Preventive security for data through analyses and regulations

The solution offers your organization granular and reliable protection for data communication. Work processes and data transfer will not be hindered. The software first determines the relevant overall data security situation in the network.

Automated Endpoint Detection & Response

Automatically secure end devices and defend against attacks

We secure your end devices with an agent. The software supports the defense of ransomware and unknown attacks by means of a multi-level defense system. The solution with advanced machine learning technologies and behavioral analysis maximizes protection and minimizes false positives. For example, this helps you block zero-day attacks that exploit memory-based vulnerabilities in popular applications.

Automated Endpoint Security

powered by enSilo

enSilo is a data protection platform that combines the functions of an Endpoint Prevention Platform (EPP) with those of an Endpoint Detection and Response (EDR) and enables the control of application communication.

And in real time.

Avoid the Cyber Kill

Infiltration cannot always be prevented. Our solution focuses on securing your data so that it cannot be encrypted, manipulated or stolen. This gives your IT security department enough time to analyze the entrance gates for possible security gaps and develop counter-strategies.

Red card for Spectre and Meltdown!

The Endpoint Security Partnership

Matrix42, the leading provider of workspace management solutions, has entered into a strategic partnership with enSilo and now offers the innovative security company’s products exclusively in Central Europe and integrates enSilo into its comprehensive Workspace Management Suite.

How it works

ENSILO COLLECTOR

Step 1:

Collector collects operating system metadata.

during connection establishment
during data modification

CONSEQUENTIAL ACTIVITIES

Step 2:

When a connection is established or a file is modified, a snapshot is sent to the core.

ENSILO CORE

Step 3:

The core analyzes the metadata and prevents data theft or Ransomware attack.